{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T12:10:25Z","timestamp":1772885425520,"version":"3.50.1"},"reference-count":94,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3416045","type":"journal-article","created":{"date-parts":[[2024,6,17]],"date-time":"2024-06-17T18:22:31Z","timestamp":1718648551000},"page":"86596-86617","source":"Crossref","is-referenced-by-count":9,"title":["Cybersecurity Education and Awareness Among Parents and Teachers: A Survey of Bahrain"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-9827-8299","authenticated-orcid":false,"given":"Mohamed","family":"Ayyash","sequence":"first","affiliation":[{"name":"Royal Academy of Police, Ministry of Interior, Manama, Bahrain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6004-3756","authenticated-orcid":false,"given":"Tariq","family":"Alsboui","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Huddersfield, Huddersfield, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1350-8933","authenticated-orcid":false,"given":"Omar","family":"Alshaikh","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Huddersfield, Huddersfield, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9930-8117","authenticated-orcid":false,"given":"Isa","family":"Inuwa-Dutse","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Huddersfield, Huddersfield, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8613-8200","authenticated-orcid":false,"given":"Saad","family":"Khan","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Huddersfield, Huddersfield, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1747-9914","authenticated-orcid":false,"given":"Simon","family":"Parkinson","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Huddersfield, Huddersfield, U.K."}]}],"member":"263","reference":[{"issue":"1","key":"ref1","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1016\/j.dcan.2022.03.007","article-title":"Application of meta-learning in cyberspace security: A survey","volume":"9","author":"Yang","year":"2023","journal-title":"Digit. Commun. Netw."},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.13181\/mji.v28i1.2752"},{"key":"ref3","volume-title":"PISA 2015 Results (Volume III): Students\u2019 Well-Being, PISA","year":"2017"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1787\/e071a505-en"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1177\/183693911303800105"},{"key":"ref6","volume-title":"Why Children Are Unsafe in Cyberspace","year":"2022"},{"key":"ref7","volume-title":"Tnternet Crimes Report (2015\u20132022)","year":"2015"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2016.04.004"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.36923\/jicc.v23i3.99"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1177\/0267323114521045"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2019.0370"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2023.2188122"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.pedhc.2019.10.001"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300336"},{"key":"ref15","volume-title":"Kingdon of Bahrai: National Internet Safety Review","author":"Davidson","year":"2015"},{"key":"ref16","volume-title":"Child Online Protection Kingdom of Bahrain","author":"Al-Mannai","year":"2015"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1111\/jsr.12388"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2022.101863"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CR.2018.8626830"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ITECHA.2017.8101918"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.51380\/gujr-39-03-07"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1108\/10650741211243157"},{"key":"ref23","volume-title":"National Cyber Security Alliance Survey Reveals the Complex Digital Lives of American Teens and Parents","year":"2023"},{"key":"ref24","first-page":"1","article-title":"Information security awareness in UAE: A survey paper","volume-title":"Proc. Int. Conf. Internet Technol. Secured Trans.","author":"Aloul"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.18178\/ijiet.2020.10.5.1393"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1002\/rev3.3425"},{"key":"ref27","volume-title":"CMRPI Prevention Plan\u2014Childmolestation prevention.org","year":"2023"},{"key":"ref28","volume-title":"Child Maltreatment","author":"Organisation","year":"2022"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/752081"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s40653-022-00440-x"},{"issue":"2","key":"ref31","first-page":"8","article-title":"Effectiveness of cyber security awareness program for young children: A case study in UAE","volume":"3","author":"Al Shamsi","year":"2019","journal-title":"Int. J. Inf. Technol. Lang. Stud."},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1002\/trtr.1168"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.30935\/cedtech\/13253"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.54536\/ajet.v2i4.2248"},{"key":"ref35","volume-title":"Technology innovation management review defining cybersecurity","author":"Craigen","year":"2014"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1504\/IJCIS.2013.051608"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2023.2268608"},{"key":"ref38","volume-title":"What is Cyber Security?","author":"Centre","year":"2023"},{"key":"ref39","article-title":"D\u00e9fense et s\u00e9curit\u00e9 nationale","author":"Blanc","year":"2013"},{"key":"ref40","volume-title":"Ministry of Electronics & Information Technology","year":"2023"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2665968"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.trf.2020.09.019"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.tranpol.2022.04.011"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3344653"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103694"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3400030"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1049\/bme2.12087"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3533703"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.28945\/3683"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1177\/01655515211053808"},{"key":"ref51","article-title":"Children\u2019s online activities, risks and safety: A literature review by the UKCCIS evidence group","author":"Livingstone","year":"2017"},{"key":"ref52","volume-title":"Comparing children\u2019s online opportunities and risks across Europe: Cross-national comparisons for EU Kids Online","author":"Hasebrink","year":"2009"},{"key":"ref53","volume-title":"Children and the Internet: Great Expectations, Challenging Realities","author":"Livingstone","year":"2008"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2014.934387"},{"key":"ref55","volume-title":"Youth internet safety: Risks, responses, and research recommendations","author":"Farrukh","year":"2024"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2006.05.021"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.2190\/8YQM-B04H-PG4D-BLLH"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.03.039"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.05.024"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.06.040"},{"key":"ref61","volume-title":"Parents, teens, and online privacy","author":"Madden","year":"2012"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.51952\/9781847428844"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1108\/ITSE-09-2015-0029"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2019.0226"},{"key":"ref65","volume-title":"Overcoming Cultural Taboos: Protecting Children Online in Saudi Arabia","author":"Alsaiari","year":"2023"},{"key":"ref66","volume-title":"National Capabilities Assessment Framework","author":"Sarri","year":"2023"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102756"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102754"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.2190\/EC.46.4.f"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1111\/j.1099-0860.2008.00180.x"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1504\/ijbis.2019.10024672"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2019.e02855"},{"key":"ref73","article-title":"Rapid evidence assessment: Quantifying online facilitated child sexual abuse: Report for the independent inquiry into child sexual abuse","author":"Wager","year":"2018"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1609\/icaps.v33i1.27230"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2023.301637"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2012.708787"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2016.0046"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcci.2017.05.001"},{"key":"ref79","first-page":"229","article-title":"How effective is anti-phishing training for children?","volume-title":"Proc. 13th Symp. Usable Privacy Secur.","author":"Lastdrager"},{"key":"ref80","first-page":"159","article-title":"Pre-university cyber security education: A report on developing cyber skills amongst children and young people","author":"Waldock","year":"2022"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/CSEET.2017.19"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.5171\/2017.800299"},{"key":"ref83","first-page":"3415","article-title":"Preservice teacher concerns about teaching cyberethics, cybersafety, and cybersecurity: A focus group study","volume-title":"Proc. Soc. Inf. Technol. Teacher Educ. Int. Conf.","author":"Pusey"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/EDUCON.2010.5492435"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.17576\/apjitm-2015-0401-01"},{"key":"ref86","first-page":"1","article-title":"Youth protection: Digital citizenship\u2014Principles & new resources","volume-title":"Proc. 2nd Worldwide Cybersecurity Summit (WCS)","author":"Miles"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1142\/S0219649216500076"},{"key":"ref88","volume-title":"Cyber-Security Curricula for Basic Users","author":"Zepf","year":"2013"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2014.254"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.28945\/1813"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/463870"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1080\/09709274.2001.11907652"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1007\/BF02310555"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.3390\/software3010001"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10380310\/10559810.pdf?arnumber=10559810","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,27]],"date-time":"2024-06-27T04:52:44Z","timestamp":1719463964000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10559810\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":94,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3416045","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}